Am I part of a botnet?

Discussion in 'other firewalls' started by boltbell, Apr 20, 2013.

Thread Status:
Not open for further replies.
  1. boltbell

    boltbell Registered Member

    Joined:
    Apr 20, 2013
    Posts:
    4
    I just took a look at my connections on my router and I'm wondering if I'm part of a botnet or I got some malware/virus on the computer?

    Here are the log files, I'm using DSL (centurylink) + a Asus router.

    Code:
    Apr 20 19:49:06 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=50.137.168.66 DST=192.168.1.144 <1>LEN=134 TOS=0x00 PREC=0x00 TTL=117 ID=10546 PROTO=UDP <1>SPT=42387 DPT=48353 LEN=114 
    Apr 20 19:51:33 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=58.170.246.230 DST=192.168.1.183 <1>LEN=52 TOS=0x00 PREC=0x40 TTL=112 ID=43249 DF PROTO=TCP <1>SPT=49361 DPT=43825 SEQ=2405954664 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405AC0103030101010402) 
    Apr 20 19:51:33 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=58.170.246.230 DST=192.168.1.183 <1>LEN=48 TOS=0x00 PREC=0x40 TTL=112 ID=43253 PROTO=UDP <1>SPT=21681 DPT=43825 LEN=28 
    Apr 20 19:51:34 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=58.170.246.230 DST=192.168.1.183 <1>LEN=52 TOS=0x00 PREC=0x40 TTL=112 ID=43286 DF PROTO=TCP <1>SPT=49361 DPT=43825 SEQ=2405954664 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405AC0103030101010402) 
    Apr 20 19:51:35 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=58.170.246.230 DST=192.168.1.183 <1>LEN=52 TOS=0x00 PREC=0x40 TTL=112 ID=43321 DF PROTO=TCP <1>SPT=49361 DPT=43825 SEQ=2405954664 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405AC0103030101010402) 
    Apr 20 19:52:31 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=32.132.18.121 DST=192.168.1.144 <1>LEN=46 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP <1>SPT=42408 DPT=48353 LEN=26 
    Apr 20 19:53:56 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=24.254.234.57 DST=192.168.1.144 <1>LEN=46 TOS=0x00 PREC=0x00 TTL=115 ID=27708 PROTO=UDP <1>SPT=29542 DPT=48353 LEN=26 
    Apr 20 19:54:05 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=41.70.207.241 DST=192.168.1.144 <1>LEN=46 TOS=0x00 PREC=0x00 TTL=47 ID=0 DF PROTO=UDP <1>SPT=48528 DPT=48353 LEN=26 
    Apr 20 19:54:17 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=59.124.71.230 DST=192.168.1.144 <1>LEN=46 TOS=0x00 PREC=0x00 TTL=112 ID=23974 PROTO=UDP <1>SPT=21441 DPT=48353 LEN=26 
    Apr 20 19:54:30 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=41.70.200.194 DST=192.168.1.144 <1>LEN=46 TOS=0x00 PREC=0x00 TTL=47 ID=0 DF PROTO=UDP <1>SPT=48528 DPT=48353 LEN=26 
    Apr 20 19:55:05 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.21.2.174 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=51 ID=25276 PROTO=UDP <1>SPT=34531 DPT=48353 LEN=113 
    Apr 20 19:55:05 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.193.212.166 DST=192.168.1.144 <1>LEN=141 TOS=0x00 PREC=0x00 TTL=53 ID=16121 PROTO=UDP <1>SPT=48281 DPT=48353 LEN=121 
    Apr 20 19:55:05 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=50.137.168.66 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=117 ID=31458 PROTO=UDP <1>SPT=42387 DPT=48353 LEN=113 
    Apr 20 19:55:05 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=76.30.146.209 DST=192.168.1.144 <1>LEN=134 TOS=0x00 PREC=0x00 TTL=117 ID=3363 PROTO=UDP <1>SPT=58702 DPT=48353 LEN=114 
    Apr 20 19:55:07 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.21.2.174 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=51 ID=49617 PROTO=UDP <1>SPT=34531 DPT=48353 LEN=113 
    Apr 20 19:55:07 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.193.212.166 DST=192.168.1.144 <1>LEN=141 TOS=0x00 PREC=0x00 TTL=53 ID=58301 PROTO=UDP <1>SPT=48281 DPT=48353 LEN=121 
    Apr 20 19:55:07 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=50.137.168.66 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=117 ID=33377 PROTO=UDP <1>SPT=42387 DPT=48353 LEN=113 
    Apr 20 19:55:07 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=76.30.146.209 DST=192.168.1.144 <1>LEN=134 TOS=0x00 PREC=0x00 TTL=117 ID=3364 DF PROTO=UDP <1>SPT=58702 DPT=48353 LEN=114 
    Apr 20 19:55:11 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.193.212.166 DST=192.168.1.144 <1>LEN=141 TOS=0x00 PREC=0x00 TTL=53 ID=4825 PROTO=UDP <1>SPT=48281 DPT=48353 LEN=121 
    Apr 20 19:55:11 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.21.2.174 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=51 ID=12014 PROTO=UDP <1>SPT=34531 DPT=48353 LEN=113 
    Apr 20 19:55:11 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=50.137.168.66 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=117 ID=41120 PROTO=UDP <1>SPT=42387 DPT=48353 LEN=113 
    Apr 20 19:55:11 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=76.30.146.209 DST=192.168.1.144 <1>LEN=134 TOS=0x00 PREC=0x00 TTL=117 ID=3370 DF PROTO=UDP <1>SPT=58702 DPT=48353 LEN=114 
    Apr 20 19:55:45 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.193.212.166 DST=192.168.1.144 <1>LEN=141 TOS=0x00 PREC=0x00 TTL=53 ID=32442 PROTO=UDP <1>SPT=48281 DPT=48353 LEN=121 
    Apr 20 19:55:45 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=76.30.146.209 DST=192.168.1.144 <1>LEN=134 TOS=0x00 PREC=0x00 TTL=117 ID=3434 DF PROTO=UDP <1>SPT=58702 DPT=48353 LEN=114 
    Apr 20 19:55:46 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.21.2.174 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=51 ID=10529 PROTO=UDP <1>SPT=34531 DPT=48353 LEN=113 
    Apr 20 19:55:47 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.193.212.166 DST=192.168.1.144 <1>LEN=141 TOS=0x00 PREC=0x00 TTL=53 ID=41882 PROTO=UDP <1>SPT=48281 DPT=48353 LEN=121 
    Apr 20 19:55:47 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=76.30.146.209 DST=192.168.1.144 <1>LEN=134 TOS=0x00 PREC=0x00 TTL=117 ID=3437 DF PROTO=UDP <1>SPT=58702 DPT=48353 LEN=114 
    Apr 20 19:55:48 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.21.2.174 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=51 ID=17173 PROTO=UDP <1>SPT=34531 DPT=48353 LEN=113 
    Apr 20 19:55:48 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=50.137.168.66 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=117 ID=41351 PROTO=UDP <1>SPT=42387 DPT=48353 LEN=113 
    Apr 20 19:55:50 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=50.137.168.66 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=117 ID=41359 PROTO=UDP <1>SPT=42387 DPT=48353 LEN=113 
    Apr 20 19:55:51 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.193.212.166 DST=192.168.1.144 <1>LEN=141 TOS=0x00 PREC=0x00 TTL=53 ID=4069 PROTO=UDP <1>SPT=48281 DPT=48353 LEN=121 
    Apr 20 19:55:51 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=76.30.146.209 DST=192.168.1.144 <1>LEN=134 TOS=0x00 PREC=0x00 TTL=117 ID=3442 DF PROTO=UDP <1>SPT=58702 DPT=48353 LEN=114 
    Apr 20 19:55:52 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=71.21.2.174 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=51 ID=5405 PROTO=UDP <1>SPT=34531 DPT=48353 LEN=113 
    Apr 20 19:55:54 kernel: ACCEPT  <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=50.137.168.66 DST=192.168.1.144 <1>LEN=133 TOS=0x00 PREC=0x00 TTL=117 ID=41376 PROTO=UDP <1>SPT=42387 DPT=48353 LEN=113
     
    Last edited: Apr 20, 2013
  2. Syobon

    Syobon Registered Member

    Joined:
    Dec 27, 2009
    Posts:
    469
    are you or other pc in your network using torrent or other kind of p2p?
     
  3. boltbell

    boltbell Registered Member

    Joined:
    Apr 20, 2013
    Posts:
    4
    Not that I know of.. nothing should be peering. BTW it's happening to my iPad too o_O looks like attempts to connect to it and the firewall is accepting it.
     
    Last edited: Apr 21, 2013
  4. aladdin

    aladdin Registered Member

    Joined:
    Jan 9, 2006
    Posts:
    2,986
    Location:
    Oman
    How one knows if one is a part of botnet?

    Best regards,
     
  5. aztony

    aztony Registered Member

    Joined:
    Sep 9, 2012
    Posts:
    737
    Location:
    The Valley Arizona
    Here's a link: hxxp://www.welivesecurity.com/2010/04/21/top-10-signs-your-computer-may-be-part-of-a-botnet/
     
  6. Apr 20 19:49:06 kernel: ACCEPT <4>ACCEPT IN=ppp0 OUT=br0 <1>SRC=50.137.168.66 DST=192.168.1.144 <1>LEN=134 TOS=0x00 PREC=0x00 TTL=117 ID=10546 PROTO=UDP <1>SPT=42387 DPT=48353 LEN=114

    A packet was ACCEPTed comINg from ppp0 (the WAN side = wide area network = meaning the internet) with SouRCe is 50.137.168.66 (the website sending) and DeSTination is 192.168..1.144 (a PC/telephone/laptop/tablet behind the router on your LAN is Local Area Network) with total LENgth of 134 bytes and Type Of Service is 0x00, PRECidence = 0x00 and Time To Live is 117 milliseconds, IGentification of the datagram is 10546, PROTOcol is UDP, Source PorT is 42387, Destination PorT is 48353, data LENgth is 114 bytes.

    Go to for instance http://cqcounter.com/whois/ enter the source IP adres (here 50.137.168.66) to get an idea who is sending this data.

    192.168.1.183 problably your phone ?
    192.168.1.144 probably your PC? COMCAST Cable is problably your ISP/cable provider
     
    Last edited by a moderator: Apr 21, 2013
  7. Botnet's are used for DDos attacks, same what happens when everybody tries to call his family and friends at new year. A botnet is a crowd mob on the internet to try overload the servers of the one who receives all this traffic (everybody is calling to the same person).

    The botnet commander tells (the inbound message) you to spawn a lot of traffic to a target IP address (the outbound destination and target of the attack).

    So you would get very little inward traffic (the botnet commander), and much outward traffic to specific, repeated to same within a time frame destinations (the botnet target of attack).

    This does not look like a botnet log, but maybe a firewall expert might drop in to explain, like Stem or Seer.
     
    Last edited by a moderator: Apr 21, 2013
  8. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Were you browsing at the time of those log events? Assuming you were, I agree that the log shows normal inbound traffic to your PC.
     
  9. fax

    fax Registered Member

    Joined:
    May 30, 2005
    Posts:
    3,898
    Location:
    localhost
    :thumb: yes and a too chatty router log.
     
  10. Escalader

    Escalader Registered Member

    Joined:
    Dec 12, 2005
    Posts:
    3,710
    Location:
    Land of the Mooses

    You need to identify what firewall product you are using.

    For transparency I use OP FW Pro 8.0 at the moment. There are many other products. But that is NOT part of this thread.


    Remove all the rules and run your SW FW in learning mode for say a week then go into the rules and remove any incoming that you don't need.

    IMHO you have not got your rules set up properly to filter incoming packets.

    Incoming should be BLOCKED unless there is some reason to allow.

    Here is a good chunk of your source domains from your log (not to chatty but indicates issues with your security IMHO)

    Do you need incoming from Angola?

    Here is the translation from you log:


    Code:
    1 50.137.168.66 USA - New Jersey Comcast Cable Communications Holdings, Inc 50.137.128.0 50.137.191.255 Comcast Cable Communications Holdings, Inc 1800 Bishops Gate Blvd, Mt Laurel CNIPEO-Ip-registration@cable.comcast.com abuse@comcast.net +1-856-317-7272   c-50-137-168-66.hsd1.or.comcast.net 
    2 58.170.246.230 India Broadcast addresses  255.255.255.255 Telstra Internet Address Registry Telstra Internet, Locked Bag 5744, Canberra, ACT 2601 addressing@telstra.net abuse@telstra.net +61 3 9815 5923  CPE-58-170-246-230.lnse4.win.bigpond.net.au 
    3 32.132.18.121 USA - Florida AT&T Global Network Services, LLC 32.0.0.0 32.255.255.255 AT&T Global Network Services, LLC 3200 Lake Emma Road, Lake Mary help@ip.att.net abuse@att.net +1-919-319-8130   mobile-032-132-018-121.mycingular.net 
    4 24.254.234.57 USA - Georgia Cox Communications 24.254.192.0 24.254.255.255 Cox Communications Inc. 1400 Lake Hearn Dr., Atlanta abuse@cox.net abuse@cox.net +1-404-269-7626   ip24-254-234-57.hr.hr.cox.net 
    5 41.70.207.241 Angola IP Address pool assigned to GPRS and HSDPA customers. 41.70.192.0 41.70.255.255 Pepino Prazer Movicel Telecomunicacoes SA, Av. Talatona, Ed. Kuando Kubango, Condominio Business Park, Talatona, Luanda Sul, Luanda - Angola, Luanda, Angola pepino.prazer@movicel.co.ao  +244 222692301   
    6 59.124.71.230 India Broadcast addresses  255.255.255.255 HINET Network-Adm CHTD, Chunghwa Telecom Co., Ltd., No. 21, Sec. 21, Hsin-Yi Rd.,, Taipei Taiwan 100 network-adm@hinet.net  +886 2 2344 3007  59-124-71-230.HINET-IP.hinet.net 
    7 41.70.200.194 Angola IP Address pool assigned to GPRS and HSDPA customers. 41.70.192.0 41.70.255.255 Pepino Prazer Movicel Telecomunicacoes SA, Av. Talatona, Ed. Kuando Kubango, Condominio Business Park, Talatona, Luanda Sul, Luanda - Angola, Luanda, Angola pepino.prazer@movicel.co.ao  +244 222692301   
    8 71.193.212.166 USA - New Jersey Comcast Cable Communications, IP Services 71.193.128.0 71.193.255.255 Comcast Cable Communications, Inc. 1800 Bishops Gate Blvd., Mt Laurel CNIPEO-Ip-registration@cable.comcast.com abuse@comcast.net +1-856-317-7272   c-71-193-212-166.hsd1.or.comcast.net 
    9 76.30.146.209 USA - New Jersey Comcast Cable Communications, Inc. 76.30.0.0 76.31.255.255 Comcast Cable Communications, Inc. 1800 Bishops Gate Blvd, Mt Laurel CNIPEO-Ip-registration@cable.comcast.com abuse@comcast.net +1-856-317-7272   c-76-30-146-209.hsd1.tx.comcast.net
     
  11. boltbell

    boltbell Registered Member

    Joined:
    Apr 20, 2013
    Posts:
    4
    Thanks for the reply guys. It was a third party Roku channel that was causing the issue. The UPnP was allowing the ports to be forwarded to my local computers but the firewalls on the local computers dropped the packets.

    All is well now, thanks!
     
  12. Escalader

    Escalader Registered Member

    Joined:
    Dec 12, 2005
    Posts:
    3,710
    Location:
    Land of the Mooses

    Droped packets? Your log showed all accepting incoming?

    What log was it?
     
  13. boltbell

    boltbell Registered Member

    Joined:
    Apr 20, 2013
    Posts:
    4
    The log I posted was the router logs, but I enabled my windows firewall logs and it shows the connections being dropped. Very weird, I'm going to watching the network more closely from now on.
     
  14. Escalader

    Escalader Registered Member

    Joined:
    Dec 12, 2005
    Posts:
    3,710
    Location:
    Land of the Mooses

    Okay fine please post some of your windows firewall logs to confirm. ie The blocking of the incoming. Ensure you own ip is masked prior.:D
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.